[{"data":1,"prerenderedAt":367},["ShallowReactive",2],{"CMS_en_security_transparency":3,"mdc-6j67v9-key":225,"mdc-8p2c0q-key":251,"mdc-nfz67n-key":259,"mdc-yxyn30-key":267,"mdc--lib863-key":275,"mdc--aqiv4n-key":283,"mdc--esptw0-key":291,"mdc--hbm5ow-key":299,"mdc--g27821-key":307,"mdc-smx2xm-key":315,"mdc-1k4stb-key":323,"mdc-yeldbu-key":331,"mdc-4lxihu-key":349},{"id":4,"title":5,"body":6,"description":7,"extension":8,"faq":9,"features":6,"hero":6,"meta":29,"navigation":30,"path":31,"sections":6,"seo":32,"stem":33,"table_cards":34,"__hash__":224},"cms\u002Fen\u002Fsecurity\u002Ftransparency.yml","We are [transparent]{.accented .block .w-fit .mx-auto} about the data we use",null,"We believe that transparency is essential to build trust. That's why we clearly share information about how we handle data security and confidentiality.","yml",{"title":10,"description":11,"items":12},"Frequently Asked Questions","Everything you need to know about security, compliance, and the features of the Retyc platform.",[13,17,21,25],{"label":14,"content":15,"icon":16},"What about HDS certification?","We selected Scaleway and Clever Cloud as infrastructure providers for their security maturity: both are certified HDS (Health Data Hosting) and ISO 27001. These certifications attest to the high level of security and compliance of their infrastructure.","i-lucide-shield-check",{"label":18,"content":19,"icon":20},"Why don't you use a cookie banner?","We only use cookies that are strictly necessary for the operation of the platform, in accordance with CNIL guidelines. Therefore, we do not need to collect your consent through a cookie banner.","i-lucide-cookie",{"label":22,"content":23,"icon":24},"How can I exercise my GDPR rights?","You can exercise your rights of access, rectification, erasure, restriction, portability, and objection by contacting us at privacy@retyc.net. We are committed to responding to your requests within the legally required timeframes.","i-lucide-user-check",{"label":26,"content":27,"icon":28},"I found a security vulnerability — what should I do?","We take security very seriously. If you have discovered a vulnerability, please inform us immediately. Please refer to our [security.txt](\u002F.well-known\u002Fsecurity.txt){target=\"_blank\"} for details on how to contact us securely.","i-lucide-bug",{},true,"\u002Fen\u002Fsecurity\u002Ftransparency",{"title":5,"description":7},"en\u002Fsecurity\u002Ftransparency",[35,80,104],{"id":36,"title":37,"description":38,"table":39},"cookie","Cookie Statement","We only use cookies that are strictly necessary to operate the platform. Here is the complete list, with no unnecessary consent banner.",{"columns":40,"rows":53},[41,44,47,50],{"accessorKey":42,"header":43},"cookie_name","Cookie name",{"accessorKey":45,"header":46},"type","Type",{"accessorKey":48,"header":49},"purpose","Purpose",{"accessorKey":51,"header":52},"duration","Duration",[54,63,72],[55,57,59,61],{"id":42,"value":56},"nuxt-oidc-auth",{"id":45,"value":58},"Essential",{"id":48,"value":60},"Required to maintain the user session active.",{"id":51,"value":62},"7 days",[64,66,68,70],{"id":42,"value":65},"i18n_redirected",{"id":45,"value":67},"Preferences",{"id":48,"value":69},"Remembers the user's language.",{"id":51,"value":71},"1 year",[73,75,76,78],{"id":42,"value":74},"dashboard-sidebar-default",{"id":45,"value":67},{"id":48,"value":77},"Remembers the sidebar state (collapsed or expanded).",{"id":51,"value":79},"Session",{"id":81,"title":82,"description":83,"table":84},"local_storage","Data stored in the browser","Because there's more than just cookies... Here is the precise list of items recorded in your browser (\"Local Storage\").",{"columns":85,"rows":91},[86,89,90],{"accessorKey":87,"header":88},"key_name","Key name",{"accessorKey":45,"header":46},{"accessorKey":48,"header":49},[92,98],[93,95,96],{"id":87,"value":94},"content_checksum_*",{"id":45,"value":58},{"id":48,"value":97},"Contains the content of certain pages. Avoids unnecessary requests and ensures a smooth experience.",[99,101,102],{"id":87,"value":100},"nuxt-color-mode",{"id":45,"value":67},{"id":48,"value":103},"Remembers the preferred color mode (light or dark).",{"id":105,"title":106,"description":107,"table":108},"database","What we store in the database","Complete transparency on our practices: here are the types of data recorded in our database. All data in transit and at rest are systematically encrypted.",{"columns":109,"rows":122},[110,113,114,116,119],{"accessorKey":111,"header":112},"data_type","Data type",{"accessorKey":48,"header":49},{"accessorKey":51,"header":115},"Retention period",{"accessorKey":117,"header":118},"location","Location",{"accessorKey":120,"header":121},"encryption","End-to-end encryption + zero-knowledge",[123,134,144,152,160,169,178,188,197,206,214],[124,126,128,130,132],{"id":111,"value":125},"User email",{"id":48,"value":127},"Used for authentication and communication.",{"id":51,"value":129},"Until account deletion.",{"id":117,"value":131},"IAM \u002F Application \u002F Payment Provider \u002F Emailing",{"id":120,"value":133},"No",[135,137,139,140,142],{"id":111,"value":136},"User password",{"id":48,"value":138},"Used for authentication",{"id":51,"value":129},{"id":117,"value":141},"IAM",{"id":120,"value":143},"Not quite. We use argon2 to hash passwords, which is a very secure hashing method resistant to brute-force attacks. However, since it is a hash and not encryption, it is not possible to retrieve the original password, even for us. That's why we indicated 'No' for encryption, as the password is not encrypted but rather transformed into a secure hash.",[145,147,149,150,151],{"id":111,"value":146},"First and last name",{"id":48,"value":148},"Used to personalize the user experience.",{"id":51,"value":129},{"id":117,"value":131},{"id":120,"value":133},[153,155,156,157,159],{"id":111,"value":154},"User organization",{"id":48,"value":148},{"id":51,"value":129},{"id":117,"value":158},"IAM \u002F Application",{"id":120,"value":133},[161,163,165,166,168],{"id":111,"value":162},"User public keys",{"id":48,"value":164},"Used for encrypting user data and ensuring platform security.",{"id":51,"value":129},{"id":117,"value":167},"Application",{"id":120,"value":133},[170,172,174,175,176],{"id":111,"value":171},"User private keys",{"id":48,"value":173},"Used for decrypting user data and ensuring platform security.",{"id":51,"value":129},{"id":117,"value":167},{"id":120,"value":177},"Yes (encrypted client-side with a password, therefore inaccessible to anyone other than the user)",[179,181,183,185,187],{"id":111,"value":180},"Billing data",{"id":48,"value":182},"Required for payment processing and invoicing.",{"id":51,"value":184},"Legal minimum required for accounting",{"id":117,"value":186},"Payment Provider \u002F Accounting",{"id":120,"value":133},[189,191,193,195,196],{"id":111,"value":190},"Transfer \u002F Dataroom title",{"id":48,"value":192},"Used to identify and organize transfers and datarooms.",{"id":51,"value":194},"Until deletion of the transfer \u002F dataroom.",{"id":117,"value":167},{"id":120,"value":133},[198,200,202,203,204],{"id":111,"value":199},"Transfer message",{"id":48,"value":201},"Used to provide additional information about transfers and datarooms.",{"id":51,"value":194},{"id":117,"value":167},{"id":120,"value":205},"Yes",[207,209,211,212,213],{"id":111,"value":208},"List of members of a transfer \u002F dataroom",{"id":48,"value":210},"Required to manage user access to transfers and datarooms.",{"id":51,"value":194},{"id":117,"value":167},{"id":120,"value":133},[215,217,219,221,222],{"id":111,"value":216},"File metadata",{"id":48,"value":218},"Stored to enable sharing and collaboration.",{"id":51,"value":220},"Until deleted by the user.",{"id":117,"value":167},{"id":120,"value":223},"Yes - except file size (encrypted \u002F unencrypted) and the hash (sha256) of the file name in a dataroom to avoid collisions and manage versions of the same file. This data is necessary to ensure a smooth and secure user experience, while respecting data confidentiality.","egfzFKHCt2YIPbM5xTZy42B5N21h8Xmhua0WI1xGceQ",{"data":226,"body":227},{},{"type":228,"children":229},"root",[230],{"type":231,"tag":232,"props":233,"children":234},"element","p",{},[235,238,249],{"type":236,"value":237},"text","We are ",{"type":231,"tag":239,"props":240,"children":246},"span",{"className":241},[242,243,244,245],"accented","block","w-fit","mx-auto",[247],{"type":236,"value":248},"transparent",{"type":236,"value":250}," about the data we use",{"data":252,"body":253},{},{"type":228,"children":254},[255],{"type":231,"tag":232,"props":256,"children":257},{},[258],{"type":236,"value":7},{"data":260,"body":261},{},{"type":228,"children":262},[263],{"type":231,"tag":232,"props":264,"children":265},{},[266],{"type":236,"value":37},{"data":268,"body":269},{},{"type":228,"children":270},[271],{"type":231,"tag":232,"props":272,"children":273},{},[274],{"type":236,"value":38},{"data":276,"body":277},{},{"type":228,"children":278},[279],{"type":231,"tag":232,"props":280,"children":281},{},[282],{"type":236,"value":82},{"data":284,"body":285},{},{"type":228,"children":286},[287],{"type":231,"tag":232,"props":288,"children":289},{},[290],{"type":236,"value":83},{"data":292,"body":293},{},{"type":228,"children":294},[295],{"type":231,"tag":232,"props":296,"children":297},{},[298],{"type":236,"value":106},{"data":300,"body":301},{},{"type":228,"children":302},[303],{"type":231,"tag":232,"props":304,"children":305},{},[306],{"type":236,"value":107},{"data":308,"body":309},{},{"type":228,"children":310},[311],{"type":231,"tag":232,"props":312,"children":313},{},[314],{"type":236,"value":11},{"data":316,"body":317},{},{"type":228,"children":318},[319],{"type":231,"tag":232,"props":320,"children":321},{},[322],{"type":236,"value":15},{"data":324,"body":325},{},{"type":228,"children":326},[327],{"type":231,"tag":232,"props":328,"children":329},{},[330],{"type":236,"value":19},{"data":332,"body":333},{},{"type":228,"children":334},[335],{"type":231,"tag":232,"props":336,"children":337},{},[338,340,347],{"type":236,"value":339},"You can exercise your rights of access, rectification, erasure, restriction, portability, and objection by contacting us at ",{"type":231,"tag":341,"props":342,"children":344},"a",{"href":343},"mailto:privacy@retyc.net",[345],{"type":236,"value":346},"privacy@retyc.net",{"type":236,"value":348},". We are committed to responding to your requests within the legally required timeframes.",{"data":350,"body":351},{},{"type":228,"children":352},[353],{"type":231,"tag":232,"props":354,"children":355},{},[356,358,365],{"type":236,"value":357},"We take security very seriously. If you have discovered a vulnerability, please inform us immediately. Please refer to our ",{"type":231,"tag":341,"props":359,"children":362},{"href":360,"target":361},"\u002F.well-known\u002Fsecurity.txt","_blank",[363],{"type":236,"value":364},"security.txt",{"type":236,"value":366}," for details on how to contact us securely.",1775562802571]